SC-200: Create detections and perform investigations using Microsoft Sentinel

SC-200: Create detections and perform investigations using Microsoft Sentinel

Detect previously uncovered threats and rapidly remediate threats with built-in orchestration and automation in Microsoft Sentinel. This learning path aligns with Exam SC-200: Security Operation Analyst.

Prerequisites

  • Understand how to use KQL in Microsoft Sentinel like you could learn from learning path SC-200: Create queries for Microsoft Sentinel using Kusto Query Language (KQL)
  • Understand how data is connected to Microsoft Sentinel like you could learn from learning path SC-200: Connect logs to Microsoft Sentinel
Security Operations Analyst
Azure
Microsoft Sentinel

Related Modules

Threat detection with Microsoft Sentinel analytics
module
Intermediate   MS Learn
Azure
Microsoft Sentinel
Automation in Microsoft Sentinel
module
Intermediate   MS Learn
Azure
Microsoft Sentinel
Threat response with Microsoft Sentinel playbooks
module
Intermediate   MS Learn
Azure
Log Analytics
Security incident management in Microsoft Sentinel
module
Intermediate   MS Learn
Azure
Microsoft Sentinel
Identify threats with Behavioral Analytics
module
Intermediate   MS Learn
Azure
Microsoft Sentinel
Data normalization in Microsoft Sentinel
module
Intermediate   MS Learn
Azure
Microsoft Sentinel
Query, visualize, and monitor data in Microsoft Sentinel
module
Intermediate   MS Learn
Azure
Microsoft Sentinel
Manage content in Microsoft Sentinel
module
Intermediate   MS Learn
Azure
GitHub